CSO

CSO Update

August 11, 2019

Image: Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method. Read more ▶

Your Must-Read Stories

•

Popular Avaya enterprise VoIP phones are vulnerable to hacking

•

11 new state privacy and security laws explained: Is your business ready?

•

Black Hat keynote: Why security culture needs to change

•

New Spectre-like CPU vulnerability bypasses existing defenses

•

Famous social engineering attacks: 12 crafty cons

•

Inside the 2014 hack of a Saudi embassy

eGuide: Schneider Electric SA

Best Tools for Managing Edge Computing

The Right Tools for Edge Management Problems Read more ▶

Image: Popular Avaya enterprise VoIP phones are vulnerable to hacking

Popular Avaya enterprise VoIP phones are vulnerable to hacking

Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: 11 new state privacy and security laws explained: Is your business ready?

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more ▶

 
 
Image: Black Hat keynote: Why security culture needs to change

Black Hat keynote: Why security culture needs to change

Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale Read more ▶

Image: New Spectre-like CPU vulnerability bypasses existing defenses

New Spectre-like CPU vulnerability bypasses existing defenses

The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more ▶

Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: Inside the 2014 hack of a Saudi embassy

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS. Read more ▶

White Paper: Dell Technologies and Intel®

Extend Your IT Team, Save Money and Reduce Risk

It’s a dilemma: Your organization has a small IT team, but you can’t ignore the technology challenges facing your growing business today. You are expected to drive digital transformation, address the needs of a changing workforce and increase business agility. This whitepaper discusses the benefits IT decision-makers at midmarket organizations can achieve by transitioning to a professional support service model that helps them choose the right devices to maximize workforce productivity—and then manage those devices throughout their lifecycle. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.